Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 23:16
Static task
static1
Behavioral task
behavioral1
Sample
5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b.exe
Resource
win10v2004-20241007-en
General
-
Target
5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b.exe
-
Size
96KB
-
MD5
e7b50c2f2b86a2d531379e54feca0927
-
SHA1
90c9357d78ca70cfcba9dbc4eb59260669fbd2c9
-
SHA256
5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b
-
SHA512
76e37ac2853146348252a8fb63c6c1765072d3b664b7198aa55a049cf0eefc478a23d4ec5fcf49c95f5dcec7bce1cc2817202af958f1acf5e13c964b346646ab
-
SSDEEP
1536:ygqRorQ5n0GL/g6DneDv8/NeT9aGt4JvRGFQlAuPRKj7on7OBDr0wmuDQi65SMwc:ydoMZ/lwkI9agk5PRK3onCr/pSSfz1AV
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dmbcen32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfhkhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cfhkhd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmbcen32.exe -
Executes dropped EXE 3 IoCs
pid Process 2848 Cfhkhd32.exe 2692 Dmbcen32.exe 2588 Dpapaj32.exe -
Loads dropped DLL 9 IoCs
pid Process 2688 5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b.exe 2688 5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b.exe 2848 Cfhkhd32.exe 2848 Cfhkhd32.exe 2692 Dmbcen32.exe 2692 Dmbcen32.exe 2616 WerFault.exe 2616 WerFault.exe 2616 WerFault.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Cfhkhd32.exe 5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b.exe File created C:\Windows\SysWOW64\Fkdqjn32.dll 5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b.exe File opened for modification C:\Windows\SysWOW64\Dmbcen32.exe Cfhkhd32.exe File created C:\Windows\SysWOW64\Dpapaj32.exe Dmbcen32.exe File opened for modification C:\Windows\SysWOW64\ÿs.e¢e Dpapaj32.exe File created C:\Windows\SysWOW64\Cfhkhd32.exe 5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b.exe File created C:\Windows\SysWOW64\Dmbcen32.exe Cfhkhd32.exe File created C:\Windows\SysWOW64\Fikbiheg.dll Cfhkhd32.exe File opened for modification C:\Windows\SysWOW64\Dpapaj32.exe Dmbcen32.exe File created C:\Windows\SysWOW64\Pdkefp32.dll Dmbcen32.exe File created C:\Windows\SysWOW64\ÿs.e¢e Dpapaj32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2616 2588 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfhkhd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmbcen32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpapaj32.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cfhkhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fikbiheg.dll" Cfhkhd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dmbcen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdkefp32.dll" Dmbcen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dmbcen32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} 5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fkdqjn32.dll" 5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" 5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cfhkhd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2848 2688 5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b.exe 31 PID 2688 wrote to memory of 2848 2688 5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b.exe 31 PID 2688 wrote to memory of 2848 2688 5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b.exe 31 PID 2688 wrote to memory of 2848 2688 5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b.exe 31 PID 2848 wrote to memory of 2692 2848 Cfhkhd32.exe 32 PID 2848 wrote to memory of 2692 2848 Cfhkhd32.exe 32 PID 2848 wrote to memory of 2692 2848 Cfhkhd32.exe 32 PID 2848 wrote to memory of 2692 2848 Cfhkhd32.exe 32 PID 2692 wrote to memory of 2588 2692 Dmbcen32.exe 33 PID 2692 wrote to memory of 2588 2692 Dmbcen32.exe 33 PID 2692 wrote to memory of 2588 2692 Dmbcen32.exe 33 PID 2692 wrote to memory of 2588 2692 Dmbcen32.exe 33 PID 2588 wrote to memory of 2616 2588 Dpapaj32.exe 34 PID 2588 wrote to memory of 2616 2588 Dpapaj32.exe 34 PID 2588 wrote to memory of 2616 2588 Dpapaj32.exe 34 PID 2588 wrote to memory of 2616 2588 Dpapaj32.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b.exe"C:\Users\Admin\AppData\Local\Temp\5c16f1aba7a14f7b96dca47d44beee2316ffd1c1ca4581b0fb11c434c1ff6b6b.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\Cfhkhd32.exeC:\Windows\system32\Cfhkhd32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\Dmbcen32.exeC:\Windows\system32\Dmbcen32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\Dpapaj32.exeC:\Windows\system32\Dpapaj32.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 1445⤵
- Loads dropped DLL
- Program crash
PID:2616
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5754987708c8589990f11664200e7c7dc
SHA1f5bd356331dcc466478d17ecc7394d680aa61123
SHA256d8bbd9e8687afb4f0f94bf5d88ecd3b57a855da212b4c16e12bac787b1d2bcac
SHA512e10129cf6edb17a164162f92a33d540ae413510aa698a9883709517b05dac74b04ea8bf6f7f0ba1cc90654427d9c15f1b6200df10c48570e5e0223679c01a286
-
Filesize
96KB
MD501faab03bb73eff0d99ab3168ef731fa
SHA19098afba0332fce4550833769bfa3816df498a61
SHA2566ab6bfed3994c97fd9b68bb7b03d3eaef2dde55f214d7ccf3310dcbfbd101943
SHA51258ada84759815e60922f7a0617798ec873ab52eccb466b25d61d754f784e246830f955ce6ef3412088352e7233ae055374cb726fcf254873c63c62108cce60e3
-
Filesize
96KB
MD5e5717a26def42198aaafb9d60ae88d6d
SHA1f962bf2c7610b16cb3c78a8acd863a1f8b5035a9
SHA256675cd59be85a517af46d63d3888a7bba2276e69e13e2f9969d9f489551131fe7
SHA512f7e0436a77b01841d3ca6a8ae817e44b7ff8f0f5cee8f22395a615a175b5b8d83bc401902e16763b8c4e85e0a6c691d3ca958ec1985650e214098737c0e938d1